Symptom
While using the User-Defined transform the job fails with the following ACCESS VIOLATION message.
(14.2) 11-16-22 03:05:10 (R) (85040:80668) SYS-170101: |Session JOB_JSON|Data flow New_DataFlow4
System Exception <ACCESS_VIOLATION> occurred. Process dump option is off. Process is not dumped.
Call stack:
0x00000000620040AD, icu_3_0::Calendar::getDefaultDayInMonth()+29245 byte(s)
0x0000000061FF8BCF, NewDecoder()+40719 byte(s)
0x00000000CB62AB96, KeycodeInfoList::writeToRegistry()+17798 byte(s)
0x00000000CB622D63, NewEimDecoder()+1283 byte(s)
0x00000000CB621A66, EIMKeyDecoder::~EIMKeyDecoder()+0214 byte(s)
0x00000000CB624183, NewEimDecoder()+6435 byte(s)
0x00000000CB622D56, NewEimDecoder()+1270 byte(s)
0x00000000CB621A66, EIMKeyDecoder::~EIMKeyDecoder()+0214 byte(s)
0x00000000CB62284C, DeleteEimDecoder()+0028 byte(s)
0x00000000E18420A4, SetKeyCode()+0980 byte(s)
0x00000000EEDEC414, RtlActivateActivationContextUnsafeFast()+0276 byte(s)
0x00000000EEDEB822, LdrShutdownProcess()+0322 byte(s)
0x00000000EEDE84F8, RtlExitUserProcess()+0152 byte(s)
0x00000000EE354F4A, FatalExit()+0010 byte(s)
0x00000000E5A86E8D, exit()+0237 byte(s)
0x00000000E5A86E1F, exit()+0127 byte(s)
0x00000000C9E6777B, Py_EndInterpreter()+5259 byte(s)
0x00000000C9E656E7, Py_InitializeEx()+0455 byte(s)
0x00000000D6F0A83B, PythonExprFactoryPlugin::init()+0667 byte(s)
0x00000000D6F0A07D, PythonExprFactoryPlugin::PythonExprFactoryPlugin()+0141 byte(s)
0x00000000D6F0A46E, PythonExprFactoryPlugin::Instance()+0094 byte(s)
0x00000000D6F03913, ExprFactoryPlugin::Instance()+0115 byte(s)
0x00000000D8E92F87, UserDefinedTransform::PerTransformInit()+0135 byte(s)
0x00000000DB39605C, isisFlTransform::FlTransform::init()+0044 byte(s)
0x000000009ABBD9B2, XTran_SDK::open()+1058 byte(s)
0x000000009AD86818, XTran_desc::open()+0056 byte(s)
0x000000009ADB56F7, XProc_children::open()+0135 byte(s)
0x000000009AD8F7EC, XDataflow_desc::executeInline()+0124 byte(s)
0x000000009ADA9772, XDataflow_info::execute()+0978 byte(s)
0x000000009AD8F731, XDataflow_desc::execute()+0113 byte(s)
0x000000009ADA7CA2, XDataflow_info::compute()+0258 byte(s)
0x000000009ADA7B67, XDataflow_info::compute()+0343 byte(s)
0x0000000099D72133, AE_Main_Process_Options()+62659 byte(s)
0x0000000099DAE105, AE_Main()+2965 byte(s)
0x00000000EE3513D2, BaseThreadInitThunk()+0034 byte(s)
0x00000000EEDE5504, RtlUserThreadStart()+0052 byte(s)
Registers:
RAX=0000000000000000 RBX=00000000624235E8 RCX=00000000624235C0 RDX=0000000021A93A78 RSI=0000000000000000
RDI=0000000022A1A9C0 RBP=0000000021A940C0 RSP=0000000021A93A50 RIP=00000000620040AD FLG=0000000000010246
R8=0000000000000000 R9=0000000000000000 R10=00000000229FBFF0 R11=0000000021A93AC8 R12=0000000000000000
R13=00000000FFFFFFFF R14=00000000624235B0 R15=0000000000000001
Exception code: C0000005 ACCESS_VIOLATION
Fault address: 00000000620040AD 01:00000000000230AD C:\Program Files (x86)\SAP BusinessObjects\Data Services\bin\keydecoder.dll
==========================================================
Collect the following and send to Customer Support:
1. Log files(error_*, monitor_*, trace_*) associated with this failed job.
2. Exported ATL file of this failed job.
3. DDL statements of tables referenced in this failed job.
4. Data to populate the tables referenced in the failed job. If not possible, get the last few rows (or sample of them) when
the job failed.
5. Core dump, if any, generated from this failed job.
Read more...
Environment
- IPS 4.2 SP9 PL9
- SAP Data Services 4.2 SP14 Patch 23
- All Operating Systems
Keywords
Python, Python38.dll, SAP Data Services 4.x, User-Defined Transform, UDF,System Exception , ACCESS_VIOLATION , Process dump , KBA , EIM-DS-EXE , Job Execution , Problem
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.